Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "D78B3322-5139-498E-881E-107A316BF27A", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.0c:*:*:*:*:*:*:*", "matchCriteriaId": "3EC0FEF9-75FC-4B80-949F-0D1BFFC77AE6", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "9B6AAF29-51F6-424A-BE5A-AE886F12A707", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.5:sp1:*:*:*:*:*:*", "matchCriteriaId": "10842D30-C2A4-48B5-BC1E-45A4B8C8D677", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.5c:*:*:*:*:*:*:*", "matchCriteriaId": "88A63A99-5FC1-4235-A390-3EAE61154B33", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.5c:sp1:*:*:*:*:*:*", "matchCriteriaId": "60E11A80-D28D-47B9-83F3-045F33983797", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.8:*:*:*:*:*:*:*", "matchCriteriaId": "41658ED4-D03A-471C-9E83-A71B19229910", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.8c:*:*:*:*:*:*:*", "matchCriteriaId": "4FB25793-D70A-4AC8-947A-3C2E153BDE9B", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.0c:*:*:*:*:*:*:*", "matchCriteriaId": "9D3F4F0A-B866-4DBC-8F83-5D558FF55E9B", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:*:*:*:*:*:*:*", "matchCriteriaId": "D902FDA0-B001-4C9A-82B8-2DA0554A599F", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:p1:*:*:*:*:*:*", "matchCriteriaId": "DE8F1C31-174C-473C-BF0C-E2B25D35EBA0", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:p2:*:*:*:*:*:*", "matchCriteriaId": "A53F2315-90FE-4722-99BF-ACD068E14837", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:p3:*:*:*:*:*:*", "matchCriteriaId": "7662BB37-2990-4B2E-9444-DA2EC5EEA7D1", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "0A04F201-32A6-43CA-A4D2-72E5D16B664A", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A3FC6544-94EA-407A-B2DE-B72FEB0D6B9F", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.0c:*:*:*:*:*:*:*", "matchCriteriaId": "EF7EDBBF-A5E5-4142-9436-4203CF00AA3F", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "79A65366-9D30-47A3-914F-32E7D31442CE", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.5:sp1:*:*:*:*:*:*", "matchCriteriaId": "9B7802C5-9294-4BD7-A0E6-8A240BC73EEE", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.5c:*:*:*:*:*:*:*", "matchCriteriaId": "9423B736-E39D-4FDE-A53D-F59D1A5F75FD", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.5c:sp1:*:*:*:*:*:*", "matchCriteriaId": "8ABA543C-A5CB-48B8-A0FD-4909330E8795", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.8:*:*:*:*:*:*:*", "matchCriteriaId": "5112A04D-B67A-4006-87E2-8B59A05E0749", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.8c:*:*:*:*:*:*:*", "matchCriteriaId": "B4E444EC-4DFE-48A5-88E2-551D062C3A0E", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.9.0c:*:*:*:*:*:*:*", "matchCriteriaId": "4E7A49FD-F9B7-4881-8AEE-0A9315E79F0E", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.9.1c:*:*:*:*:*:*:*", "matchCriteriaId": "836D66B2-2D0D-4AA6-8D26-1FB4B7136C93", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.9.1c:p1:*:*:*:*:*:*", "matchCriteriaId": "24F1751D-5B62-4634-9619-7C572DC14C98", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.9.1c:p2:*:*:*:*:*:*", "matchCriteriaId": "9AF52F9B-3A0E-42CE-A8E2-C6325041D2DE", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.9.1c:p3:*:*:*:*:*:*", "matchCriteriaId": "5D855C29-8407-4E77-8E25-6D4AA03F0859", "vulnerable": true}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "08AC0017-DBCA-4E8A-ACA0-34E845802D45", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "A URL redirection to untrusted site vulnerability in HP ArcSight ESM and HP ArcSight ESM Express, in any 6.x version prior to 6.9.1c Patch 4 or 6.11.0 Patch 1. This vulnerability could be exploited remotely to allow URL redirection to untrusted site."}, {"lang": "es", "value": "Vulnerabilidad de redirecci\u00f3n de URL a un sitio no fiable en HP ArcSight ESM y HP ArcSight ESM Express, en cualquier versi\u00f3n 6.x anterior a la 6.9.1c Patch 4 o versi\u00f3n 6.11.0 Patch 1. Esta vulnerabilidad podr\u00eda explotarse de forma remota para permitir una redirecci\u00f3n de URL a un sitio no fiable."}], "id": "CVE-2017-14358", "lastModified": "2025-04-20T01:37:25.860", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0"}, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-10-31T15:29:00.380", "references": [{"source": "security@opentext.com", "url": "https://softwaresupport.hpe.com/km/KM02996760"}, {"source": "security@opentext.com", "url": "https://www.auscert.org.au/bulletins/54166"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://softwaresupport.hpe.com/km/KM02996760"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.auscert.org.au/bulletins/54166"}], "sourceIdentifier": "security@opentext.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-601"}], "source": "nvd@nist.gov", "type": "Primary"}]}